arxiv: v1 [cs.cc] 12 Feb 2009

Size: px
Start display at page:

Download "arxiv: v1 [cs.cc] 12 Feb 2009"

Transcription

1 Symposium on Theoretical Aspects of Computer Science 2009 (Freiburg), pp arxiv: v1 [cs.cc] 12 Feb 2009 A STRONGER LP BOUND FOR FORMULA SIZE LOWER BOUNDS VIA CLIQUE CONSTRAINTS KENYA UENO 1 1 Department of Computer Science, Graduate School of Information Science and Technology, The University of Tokyo address: kenya@is.s.u-tokyo.ac.jp Abstract. We introduce a new technique proving formula size lower bounds based on the linear programming bound originally introduced by Karchmer, Kushilevitz and Nisan [11] andthetheoryofstable set polytope. Weapplyit tomajority functions andprovetheir formula size lower bounds improved from the classical result of Khrapchenko [13]. Moreover, we introduce a notion of unbalanced recursive ternary majority functions motivated by a decomposition theory of monotone self-dual functions and give integrally matching upper and lower bounds of their formula size. We also show monotone formula size lower bounds of balanced recursive ternary majority functions improved from the quantum adversary bound of Laplante, Lee and Szegedy [15]. 1. Introduction Proving formula size lower bounds is a fundamental problem in complexity theory and also an extremely tough problem to resolve. A super-polynomial lower bound of a function innpimpliesnc 1 NP. Therearealot oftechniquestoproveformulasizelower bounds, e.g. [7, 8, 11, 13, 14, 15, 16]. Laptente, Lee and Szegedy [15] introduced a technique based on the quantum adversary method [1] and gave a comparison with known techniques. In particular, they showed that their technique subsumes several known techniques such as Khrapchenko [13] and its extension [14]. The current best formula size lower bound is n 3 o(1) by Håstad [7] and a key lemma used in the proof is also subsumed by the quantum adversary bound[15]. Karchmer, Kushilevitz and Nisan [11] introduced a technique proving formula size lower bounds called the linear programming (or LP) bound and showed that it cannot prove a lower bound larger than 4n 2 for non-monotone formula size in general. Lee [16] proved that the LP bound [11] subsumes the quantum adversary bound [15] and Høyer, Lee and Špalek [8] introduced a stronger version of the quantum adversary bound. Motivated by the result of Lee [16], we devise a stronger version of the LP bound by using an idea from the theory of stable set polytope, known as clique constraints [19]. Suggesting a stronger technique compared to the original LP bound [11] has possibilities to improve the best formula size lower bound because it subsumes many techniques including the key lemma of Håstad [7]. Moreover, our technique has various possibilities of extensions 1998 ACM Subject Classification: F.1.1 Models of Computation. Key words and phrases: Computational and Structural Complexity. c K. Ueno CC Creative Commons Attribution-NoDerivs License

2 686 K. UENO such as rank constraints discussed in Section 6 and orthonormal constraints [6], each of which subsume clique constraints. Due to this extendability, it is difficult to show the limitation of our new technique. To study the relative strength of our technique, we apply it to some families of Boolean functions. For each family, we have distinct motivation to investigate their formula size. Three kinds of Boolean functions treated in this paper are defined as follows. All of them are called monotone self-dual Boolean functions defined in the next section. Definition 1.1. AmajorityfunctionMAJ 2l+1 : {0,1} 2l+1 {0,1}outputs1ifthenumber of1 s intheinputbitsis greater thanor equal tol+1and0otherwise. Wedefineunbalanced recursive ternary majority functions URecMAJ h 3 : {0,1}2h+1 {0,1} as URecMAJ h 3 (x 1,,x 2h+1 ) = MAJ 3 (URecMAJ h 1 3 (x 1,,x 2h 1 ),x 2h,x 2h+1 ) with URecMAJ 1 3 = MAJ 3. We also define balanced recursive ternary majority functions BRecMAJ h 3 : {0,1}3h {0,1} as BRecMAJ h 3 (x 1,,x 3 h) = MAJ 3 (BRecMAJ h 1 3 (x 1,,x 3 h 1), BRecMAJ h 1 3 (x 3 h 1 +1,,x 2 3 h 1), BRecMAJ h 1 3 (x 2 3 h 1 +1,,x 3 h)) with BRecMAJ 1 3 = MAJ 3. Through the paper, n means the number of input bits. Formula size and monotone formula size of a Boolean function f are denoted by L(f) and L m (f), respectively. Although our improvements of lower bounds seem to be slight, it breaks a stiff barrier (known as the certificate complexity barrier [15]) of previously known proof techniques. The best monotone upper and lower bounds of majority functions are O(n 5.3 ) [25] and n/2 n [22], respectively. In the non-monotone case, the best formula size upper and lower bounds of majority functions are O(n 4.57 ) [20] and n/2 2 (= (l + 1) 2 when n = 2l + 1), respectively, which can be proven by the classical result of Khrapchenko [13]. In this paper, we slightly improve the non-monotone formula size lower bound while no previously known techniques has been able to improve it since In Section 4, we will prove (l+1) 2 1 ǫ(l) L(MAJ 2l+1) where ǫ(l) = l2 (l+1) 6 ( 2l+1 l ). Here, ( n k) denotes n C k. Since formula size takes an integral value, it implies a (l+1) 2 +1 lower bound. It is known that the class of monotone self-dual Boolean functions is closed under compositions (equivalently, in so-called Post s lattice [5, 21]). Any monotone self-dual Boolean functions can be decomposed into compositions of 3-bit majority functions [9]. A key observation for our proofs is that a communication matrix (defined in the next section) of a monotone self-dual Boolean function contains those of the 3-bit majority function as its submatrices. Ibaraki and Kameda [9] developed a decomposition theory of monotone self-dual Boolean functions in the context of mutual exclusions in distributed systems. The theory has been further investigated by [3, 4]. Given a monotone self-dual Boolean function f, we can decompose it as f = MAJ 3 (x,f 1,(MAJ 3 (x,f 2,MAJ 3 ( MAJ 3 (x,f k 1,f k ))))) after decomposing g = f(x = 0) into a conjunction of monotone self-dual functions g = f 1 f 2 f k. It holds URecMAJ h 3 in its internal structure. To determine its formula size is of particular interest because it is related with efficiency of the decomposition scheme. In Section 5, we will prove L(URecMAJ h 3) = L m (URecMAJ h 3) = 4h+1.

3 LP BOUND VIA CLIQUE CONSTRAINTS 687 Balanced recursive ternary majority functions have been studied in several contexts [10, 15, 17, 18, 23, 24], see [15] and [23] for details. Ambainis et al. [2] showed a quantum algorithm which evaluates a monotone formula of size N (or called AND-OR formula) in N 1/2+o(1) time even if it is not balanced. This result implies BRecMAJ h 3 can be evaluated in O( 5 h ) time by the quantum algorithm because we have a formula size upper bound L m (BRecMAJ h 3) 5 h as noted in [15]. Improving this result, Reichardt and Spalek [23] gave a quantum algorithm which evaluates BRecMAJ h 3 in O(2 h ) time. From this context, seeking the true bound of the monotone formula size of BRecMAJ h 3 is a very interesting research question. The quantum adversary bound [15] has a quite nice property written as ADV(f g) ADV(f) ADV(g). It directly implies a formula size lower bound 4 h L(BRecMAJ h 3 ). In Section 6, we will prove 20 L m(brecmaj 2 3 ) and 4h ( 8 ) h 3 Lm (BRecMAJ h 3 ). This gives a slight improvement of the lower bound and means that the 4 h lower bound is at least not optimal in the monotone case. 2. Preliminaries We define a total order 0 < 1 between the two Boolean values. For Boolean vectors x = (x 1,,x n ) and y = (y 1,,y n ), we define x y if x i y i for all i {1, n}. A Boolean function f is called monotone if x y implies f( x) f( y) for all x, y {0,1} n. For a monotone Boolean function f, a Boolean vector x {0,1} n is called minterm if f( x) = 1 and ( y x) ( x y) implies f( y) = 0 for any y {0,1} n and called maxterm if f( x) = 0 and ( x y) ( x y) implies f( y) = 1 for any y {0,1} n. Sets of all minterms and maxterms of a monotone Boolean function f are denoted by mint(f) and maxt(f), respectively. A Boolean function f is called self-dual if f(x 1,,x n ) = f(x 1,,x n ) where x is the negation of x. Remark that, if a Boolean function f is self-dual, its communication matrix (see below) has some nice properties, e.g. X = Y. A formula is a binary tree with leaves labeled by literals and internal nodes labeled by and. A literal is either a variable or the negation of a variable. A formula is called monotone if it does not have negations. It is known that all (monotone) Boolean functions can be represented by a (monotone) formula. The size of a formula is its number of leaves. We define the (monotone) formula size of a Boolean function f as the size of the smallest formula computing f. Karchmer and Wigderson [12] characterize formula size of any Boolean function in terms of a communication game called the Karchmer-Wigderson game. In the game, given a Boolean function f, Alice gets an input x such that f( x) = 1 and Bob gets an input y such that f( y) = 0. The goal of the game is to find an index i such that x i y i. They also characterize monotone formula size by a monotone version of the Karchmer-Wigderson game. In the monotone game, Alice gets a minterm x and Bob gets a maxterm y. The goal of the monotone game is to find an index i such that x i = 1 and y i = 0. The number of leaves in a best communication protocol for the (monotone) Karchmer-Wigderson game is equal to the (monotone) formula size of f. From these characterizations, we consider communication matrices derived from the games. Definition 2.1 (Communication Matrix). Given a Boolean function f, we define its communication matrix as a matrix whose rows and columns are indexed by X = f 1 (1) and Y = f 1 (0), respectively. Each cell of the matrix contains indices i such that x i y i. In

4 688 K. UENO a monotone case, given a monotone Boolean function f, we define its monotone communication matrix as a matrix whose rows and columns are indexed by X = mint(f) and Y = maxt(f), respectively. Each cell of the matrix contains indices i such that x i = 1 and y i = 0. A combinatorial rectangle is a direct product X Y where X X and Y Y. A combinatorial rectangle X Y is called monochromatic if every cell ( x, y) X Y contains the same index i. We call a cell singleton if it contains just one index. The minimum number of disjoint monochromatic rectangles which exactly cover all cells in the (monotone) communication matrix gives a lower bound for the number of leaves of a best communication protocol for the (monotone) Karchmer-Wigderson game. Thus, we obtain the following bound. Theorem 2.2 (Rectangle Bound [12]). The minimum size of an exact cover by disjoint monochromatic rectangles for the communication matrix (or monotone communication matrix) associated with a Boolean function f gives a lower bound of L(f) (or L m (f)). 3. A Stronger Linear Programming Bound via Clique Constraints In this study, we devise a new technique proving formula size lower boundsbased on the LP bound[11] with clique constraints. We assume that readers are familiar with the basics of the linear and integer programming theory. Karchmer, Kushilevitz and Nisan [11] formulate the rectangle bound as an integer programming problem and give its LP relaxation. Given a (monotone) communication matrix, it can be written as min r x r such that r c x r = 1 for each cell c in the matrix and x r 0 for each monochromatic rectangle r. The dual problem can be written as max c w c such that c r w c 1 for each monochromatic rectangle r. Here, each variable w c is indexed by a cell c in the matrix. From the duality theorem, showing a feasible solution of the dual problem gives a formula size lower bound. Now, we introduce our stronger LP bound using clique constraints from the theory of stable set polytope. We assume that each monochromatic rectangle is a node of a graph. We connect two nodes by an edge if the two corresponding monochromatic rectangles intersect. If a set of monochromatic rectangles q compose a clique in the graph, we add a constraint r q x r 1 to the primal problem of the LP relaxation. This constraint is valid for all integral solutions since we consider the disjoint cover problem. That is, we can assign the value 1 to at most 1 rectangle in a clique for all integral solutions under the condition of disjointness. The dual problem can be written as max c w c+ q z q such that c r w c + q r z q 1 for each monochromatic rectangle r and z q 0 for each clique q. Intuitively, this formulation can be interpreted as follows. Each cell c is assigned a weight w c. The summation of weights over all cells in a monochromatic rectangle is limited to 1. This limit is relaxed by 1 if it is contained by a clique. Thus, the limit of the total weight for a monochromatic rectangle contained by k distinct cliques is k +1. By using clique constraints, we obtain the following matching lower bound for the formula size of the 3-bit majority function while the original LP bound cannot prove a lower bound larger than 4.5. In our proofs, we utilize the following property of combinatorial rectangles which is trivial from the definition. If a rectangle contains two cells (α 1,β 1 ) and (α 2,β 2 ), it also contains both (α 1,β 2 ) and (α 2,β 1 ). A notion of singleton cells also occupies an important role for our proofs because there are no monochromatic rectangles which contain different kinds of singleton cells.

5 LP BOUND VIA CLIQUE CONSTRAINTS 689 Theorem 3.1. L(MAJ 3 ) = L m (MAJ 3 ) = 5 Proof. Wehaveamonotoneformula(x 1 x 2 ) ((x 1 x 2 ) x 3 )formaj 3. Fromthedefinition, L(MAJ 3 ) L m (MAJ 3 ). To prove L(MAJ 3 ) 5, we consider a communication matrix of the 3-bit majority function whose rows and columns are restricted to minterms and maxterms, respectively ,2, ,2, ,2,3 3 2 Figure 1: The Communication Matrix of MAJ 3 In the dual problem, we assign weights 1 for all singleton cells and 0 for other cells. There are 6 singleton cells and hence the total weight is 6. We take a clique q composed of monochromatic rectangles containing two singleton cells. It is clear that every pair of monochromatic rectangles contained by q intersect at some cell. We assign z q = 1. Then, the objective function of the dual problem becomes 5 = 6 1. Now, we show that all constraints of the dual problem are satisfied. First, we consider a monochromatic rectangle which contains at most one singleton cell. In this case, the constraint is clearly satisfied because the summation of weights in the monochromatic rectangle is less than or equal to 1. Then, we consider a monochromatic rectangle which contains two singleton cells. In this case, the summation of weights in the monochromatic rectangle is 2. However, it is contained by the clique q. It implies that the limit of the total weight is relaxed by 1. Thus, the constraint is satisfied. There are no monochromatic rectangles which contain more than 3 singleton cells because a rectangle which contains more than two kinds of singleton cells is not monochromatic. 4. Formula Size of Majority Functions In this section, we show a non-monotone formula size lower bound of majority functions improved from the classical result of Khrapchenko [13]. Theorem 4.1. L(MAJ 2l+1 ) (l+1)2 1 ǫ(l) where ǫ(l) = l2 (l +1) ). 6 (2l+1 l Proof. We consider a communication matrix of a majority function with 2l +1 input bits whose ( rows and columns are restricted to minterms and maxterms, respectively. Let m = 2l+1 ) l, which is equal to both the number of rows and columns. Then, the number of all cells is m 2. The number of singleton cells is (l + 1)m and hence the number of singleton cells for each index is (l+1)m 2l+1. The number of cells with 3 indices is ( l+1 2 ) l m = l 2 (l+1)m 2 because we can obtain a maxterm by flipping two bits of 1 s to 0 s and one bit of 0 to 1 for each minterm. We consider 3 3 submatrices in the following way. From 2l + 1 input bits, we fix arbitrary 2l 2 bits and assume that they have the same number of 0 s and 1 s. Then, we consider the remaining 3 bits. If the 2l + 1 input bits compose a minterm, the 3

6 690 K. UENO bits are 110 or 101 or 011. If the 2l + 1 input bits compose a maxterm, the 3 bits are 100 or 010 or 001. Thus, we have a 3 3 submatrix, which has the same structure as the communication matrix of the 3-bit majority function as Figure 1. The number of submatrices is ( 2l+1) ( 3 2l 2 ) l 1 = l 2 (l+1)m 6. Each submatrix has 6 singleton cells and 3 cells each of which has 3 indices corresponding to the remaining 3 bits. Note that each cell with 3 indices in any submatrix is not contained by other submatrices. In other words, all the l 2 (l+1)m 2 cells with 3 indices are exactly partitioned into the l2 (l+1)m 6 submatrices. We assign weights a for all singleton cells, 0 for cells with 3 indices and b for other cells, which have more than 3 indices. Note that there are no cells with 2 indices. We consider l 2 (l+1)m 6 clique constraints assigned weights c ( 0) for all the l2 (l+1)m 6 submatrix. That is, we have a clique constraint for each submatrix similar to the proof of Theorem 3.1. More precisely, a clique associated with a submatrix is composed of monochromatic rectangles which contain two singleton cells in the submatrix. Then, the objective function of the dual problem is written as ( ) max (l+1)m a+ m 2 (l+1)m l2 (l +1)m b+ l2 (l +1)m c. (4.1) a,b,c 2 6 Now, we fix c = 2b 0. Then, we have max a,b (l+1)m a+ ( m 2 (l +1)m l2 (l+1)m 6 ) b. (4.2) We assume that a monochromatic rectangle contains k singleton cells and consider all possible pairs of 2 singleton cells taken from the k singleton cells. If a pair is in the same submatrix, the monochromatic rectangle is contained by a clique associated with the submatrix. If a pair is not in the same submatrix, the monochromatic rectangle contains two cells which are assigned weights b because they have more than 3 indices. Thus, if the following inequality is satisfied k a+(k 2 k) b 1 (4.3) for any integer k (1 k (l+1)m 2l+1 ), all constraints of the dual problem are satisfied when c = 2b. We can maximize (4.2) by assuming that the inequality is saturated when k = m as it satisfies k2 k k and obtain the lower bound. = m2 (l+1)m l 2 (l+1)m 6 (l+1)m. In this case, we have (4.2) = (l+1)m m l+1 l2 6 l+1 l2 6 = (l+1)2 m m 1 6 l2 (l+1) 5. Formula Size of Unbalanced Recursive Ternary Majority Functions In this section, we show the following matching bound of formula size for unbalanced recursive ternary majority functions. Theorem 5.1. L(URecMAJ h 3) = L m (URecMAJ h 3) = 4h+1 Proof. First, we look at the monotone formula size upper bound. Recall that a monotone formulaofthe3-bitmajority functioncanbewrittenas(x 1 x 2 ) ((x 1 x 2 ) x 3 ). Theimportant point here is that the literal x 3 appears only once. We construct (x 2h x 2h+1 ) ((x 2h x 2h+1 ) x 2h 1 ) and replace x 2h 1 by a monotone formula representing URecMAJ h 1 3. A recursive construction yields a 4h+1 monotone formula for URecMAJ h 3.

7 LP BOUND VIA CLIQUE CONSTRAINTS 691 Then, we show the non-monotone formula size lower bound. Before using clique constraints, we consider the original LP bound. We restrict the communication matrix of URecMAJ h 3 to a submatrix S h whose rows and columns are minterms and maxterms, respectively. We can interpret it in the following recursive way as Figure h,2h+1 2h+1 2h 01 2h+1 T h 1 S h h S h 1 T h 1 Figure 2: Recursive Structure of S h for URecMAJ h 3 (h 2) In the figure, 11 denotes a minterm which has 1 in the 2h-th and (2h + 1)-th bits and 0 in other (2h 1) bits. Minterms denoted by 01 has 0 in the 2h-th bit and 1 in the (2h+1)-th bit and other (2h 1) bits of them are determined by a recursive way from minterms of URecMAJ h 1 3. Minterms denoted by 10 has 1 in the 2h-th bit and 0 in the (2h + 1)-th bit and other (2h 1) bits of them are also determined by the recursive way. 00, 10 and 01 denote maxterms which are similarly defined as minterms. A submatrix T h 1 does not contain singleton cells because all cells in T h 1 contains indices {2h,2h + 1} with indices of corresponding cell in S h 1. S h contains two S h 1. Thus, the number of singleton cells duplicate in each recursion. We consider the minimum submatrix ALL S 1 in S h which contains all three kinds of singleton cells {1}, {2} and {3}. Note that ALL S 1 does not contain any other kinds of singleton cells because it only contains cells in S 1 and T l (2 l h 1). A submatrix S 1 is equivalent to a communication matrix of the 3-bit majority function. The total number of singleton cells {1}, {2} and {3} is 3 2 h. Both the number of rows and columns of ALL S 1 is equal to 3 2 h 1 because S 1 s duplicate (h 1)-times and does not have any common rows and columns. Hence, the number of all cells in ALL S 1 is 9 4 h 1. We assign weights a for all singleton cells in ALL S 1 and weights b for all other cells in ALL S 1. Then, the total weight of all cells in ALL S 1 is written as follows: max a,b 3 2h a+ ( 9 4 h h) b. (5.1) We consider constraints of the dual problem as k a + (k 2 k) b 1 for all integer k (1 k 2 h ). We assume this inequality is saturated if and only if k = 3 2 h 2. Then, we get a = 24 2h 16 and b = 16. In this case, (5.1) = h 9 4 h Next, we consider singleton cells {2l} and {2l +1} (2 l h). We partition singleton cells {2l} into two sets named vertical cells X 2l and horizontal cells Y 2l which are in (10,00) and (11,01) of each S l in S h, respectively. Similarly, we partition singleton cells {2l+1} into twosetsnamedvertical cells X 2l+1 andhorizontal cells Y 2l+1 whicharein(01,00) and(11,10) of each S l in S h, respectively. We restrict these sets to the minimum subsets X 2l X 2l, X 2l+1 X 2l+1, Y 2l Y 2l and Y 2l+1 Y 2l+1 so as to satisfy the following condition: If a monochromatic rectangle contains all cells in X 2l X 2l+1 Y, it also contains all cells 2l Y 2l+1 in ALL S 1. Note that rows and columns of singleton cells {2l} and{2l+1} dominate those of singleton cells {1}, {2} and {3}. So, we have X 2l = X 2l+1 = Y 2l = Y 2l+1 = 3 2h 2. 1 We assign weights for all singleton cells in X 3 2 h 2 2l X 2l+1 Y 2l Y 2l+1 and 0 for other

8 692 K. UENO cells at (11,00) of each S l and cells outside ALL S 1. A monochromatic rectangle which contains x cells in X 2l and y in from Y 2l also contains x y cells in ALL S 1 which are assigned weights b. The same thing is true for the case of X 2l+1 and Y 2l+1. Because we have 4 (x+y) 3 2 h xy h 1 (5.2) for all 0 x,y 3 2 h 2, all constraints of the dual problem are satisfied. The total weight of singleton cells {2l} and {2l+1} is 4. So, the total weight of all cells in S h now becomes 4h. Now, we incorporate clique constraints. The number of S 1 in S h is 2 h 1. We change weights of all non-singleton cells in submatrices S 1 from b to 0. On behalf of them, we add a clique constraint for each S 1 in S h. Then, (5.1) becomes ( max a,b,c 3 2h a+ 9 4 h h 3 2 h 1) b+2 h 1 c. (5.3) where c is a weight assigned for each clique constraint. If we take a = 24 2h 16, b = h 9 4 h and c = 2b, all constraints of the dual problem are satisfied and (5.3) = h. Consequently, the total weight is 4h h. Since formula size must be an integer, we have shown the theorem. 6. Monotone Formula Size of Balanced Recursive Ternary Majority Functions In this section, we show monotone formula size lower bounds of balanced recursive ternary majority functions. For this purpose, we consider rank constraints, which are generalizations of clique constraints. Similarly to the case of clique constraints, we consider a graph composed of monochromatic rectangles and its induced subgraph g. We consider a constraint r g x r α(g) where α(g) is the stability number of g. This constraint is valid because we can assign 1 at most α(g) rectangles in g for any integral solution. The dual problem can be written as max c w c+ q z q + g α(g)z g such that c r w c+ q r z q + g r z g 1 for each monochromatic rectangle r, z q 0 for each clique q and z g 0 for each subgraph g. First, we consider the case of height 2. By using clique constraints and rank constraints, we prove the following improved monotone formula size lower bound while we know that the original LP bound cannot prove a lower bound larger than Theorem 6.1. L m (BRecMAJ 2 3 ) 20 Proof. There are 27 minterms and 27 maxterms for the recursive ternary majority function of height 2. Among them, we choose the following 9 minterms and 9 maxterms 110,110, ,101, ,011, ,000, ,000, ,000, ,110, ,101, ,011, ,100, ,010, ,001, ,111, ,111, ,111, ,100, ,010, ,001,111.

9 LP BOUND VIA CLIQUE CONSTRAINTS 693 From these 9 minterms and 9 maxterms, a submatrix of the communication matrix can be described as Figure 3. In the figure, we abbreviate a minterm e.g. 101,101,000 by 110 and 101, which represent the second level and the first level structure of the 9 bits, respectively. Notice that all minterms which we choose have the same structure in all 3-bits minterm blocks at the first level. The same thing is true for all 9 maxterms , ,2 2,5 1,4 1,2,4, , ,3 1 3,6 1,3,4,6 1, , , ,3,5,6 3,6 2, ,8 2,8 1,7 1,2,7, , ,9 7 3,9 1,3,7,9 1,7 3 1, , ,3,8,9 3,9 2,8 2, ,8 4,7 4,5,7, , , ,9 4,6,7,9 4,7 9 7, , ,6,8,9 6,9 5,8 8, ,6 6 5 Figure 3: A Submatrix of the Communication Matrix for BRecMAJ Figure 4: Serial Numbers for 81 cells of the Submatrix To describe 12 cliques q 1,,q 12 and a induced subgraph g whose stability number is 4, we give serial numbers for 81 cells as Figure 4. We take the following 12 cliques each of which consists of 3 pairs of 2 singleton cells: { (5, 15), (4, 24), (13, 23) }, { (35, 45), (34, 54), (43, 53) }, { (2, 12), (1, 21), (10, 20) }, { (62, 72), (61, 81), (70, 80) }, { (29, 39), (28, 48), (37, 47) }, { (59, 69), (58, 78), (67, 77) }, { (5, 35), (2, 62), (29, 59) }, { (15, 45), (12, 72), (39, 69) }, { (4, 34), (1, 61), (28, 58) }, { (24, 54), (21, 81) (48, 78) }, { (13, 43), (10, 70), (37, 67) }, { (23, 53), (20, 80), (47, 77) }.

10 694 K. UENO For each combination of 3 pairs, it is easy to verify that rectangles each of which contains both of two singleton cells from one of the 3 pairs compose a clique. Next, we consider the following 18 pairs of singleton cells which induce the subgraph g: (5, 45), (15, 35), (4, 54), (24, 34), (13, 53), (23, 43), (2, 72), (12, 62), (1, 81), (21, 61), (10, 80), (20, 70), (29, 69), (39, 59), (28, 78), (48, 58), (37, 77), (47, 67). If a rectangle contain both of two singleton cells from one of 18 pairs, it also contains 2 cells from 9 cells { 9, 17, 25, 33, 41, 49, 57, 65, 73 }. Thus, we can choose at most 4 pairs without conflicts from 18 pairs. It implies that the stability number of g is 4. Notice that all these 12 cliques and the subgraph cover all pairs of two singleton cells which have the same index. We assign 1 for all 36 singleton cells in this submatrix and 0 for other cells. We take z q1 = = z q12 = z g = 1. Then, the objective value of the dual problem becomes = 20. If a rectangle contains at most one singleton cell, the constraint of the dual problem is trivially satisfied. If a rectangle contains k (2 k 4) singleton cells, it is covered by k 1 cliques or k 2 cliques plus the subgraph g. So, the constraint is also satisfied. As a consequence, we obtain the formula size lower bound. Note that we need a much more complicated argument to look at the non-monotone case, which we do not investigate in this paper, because singleton cells in the monotone communication matrix are not singleton in the non-monotone communication matrix. In the general monotone case, we can prove a slightly better lower bound than the quantum adversary bound [15], which shows a 4 h lower bound. Theorem 6.2. L m (BRecMAJ h 3) 4 h + 13 (8 h 36 3) (h 2) Proof. First, we choose 3 h minterms and 3 h maxterms from 3 h input bits of BRecMAJ h 3 so as to have the same structure in the 1st, 2nd, and h-th levels in the following sense. In the l-th level, we have 3 h l bits which are recursively constructed from lower levels in the following way. We partition 3 l bits into 3 l 1 blocks each of which contains consecutive 3 bits. For each block of 3 bits, we replace them into 1 bit which is the output of MAJ 3 with the 3 bits. Then, we get 3 h (l+1) bits. We have 3 h bits as input bits in the first level and can construct them for each level by induction. If all of 3 l 1 blocks have the same 3 bits except 000 and 111 in the case of minterms and maxterms, respectively, we call that they have the same structure in the l-the level. There are 3 h minterms and 3 h maxterms because we have 3 choices in each level. We consider the submatrix whose rows and columns are composed of these 3 h minterms and 3 h maxterms, respectively. From another viewpoint, we can interpret it as a recursively construction of the submatrix S h of the communication matrix of BRecMAJ h 3 as follows. We define S h (k) (k = 1,2,3) as a matrix such that some cell of S h (k) contains an index (k 1) 3 h + i if and only if the corresponding cell of S h contains an index i. By induction, we can see that the number of all cells and singleton cells in S h is 9 h and 6 h, respectively. Singleton cells of each index from 3 h bits in S h is 2 h. Indices of cells in T h (1,2), T h (2,3) and T h (2,3) in Figure 5 can be determined from the property of combinatorial rectangles, but we do not go to the details because we will assign the same weight for all these cells in each level. Before using clique and rank constraints, we consider the original LP bound. We assign weights a for all singleton cells, b for other cells in the submatrix and 0 for all cells in the outside of the submatrix. Then, the objective value of the dual problem is written as max a,b 6h a+(9 h 6 h ) b. (6.1)

11 LP BOUND VIA CLIQUE CONSTRAINTS S h 1 (2) S h 1 (1) T h 1 (1,2) 101 S h 1 (3) T h 1 (2,3) S h 1 (1) 011 T h 1 (2,3) S h 1 (3) S h 1 (2) Figure 5: Recursive Structure of S h for BRecMAJ h 3 (h 2) If a rectangle contains k singleton cells, it also contains at least k 2 k cells which are not singleton. Thus, if k a + (k 2 k) b 1 is satisfied for all integer k (1 k 2 h ), then all constraints of the dual problem are also satisfied. We assume that the inequality is saturated if and only if k = (3/2) h. Then, we get a = 2 6h 4 h and b = 4h. In this case, 9 h 9 h we have (6.1) = 4 h. Now, we incorporate clique and rank constraints. We change weights of all cells except singleton cells in all S 2 s in the second level from b to 0. Then, we add 12 clique constraints and a rank constraint for each S 2 in the second level by following the way of Theorem 6.1. Let c and d be values assigned for every clique and rank constraints, respectively. Then, the objective value of the dual problem is max a,b,c,d 6h a+(9 h 81 6 h 2 ) b+12 6 h 2 c+4 6 h 2 d. (6.2) If we take c = d = 2b, then we have (6.2) = 6 h a + (9 h 49 6 h 2 ) b = 4 h (8 h. 3) Since all weights which are changed from b to 0 are exactly compensated by clique and rank constraints, all constraints of the dual problem are satisfied. We do not exhaust the potential of our new method and have possibilities to improve the lower bound. For example, we can improve the lower bound as 4 h h +c (8 3) for some constant c by further detailed analysis in constantly higher levels. 7. Conclusions In this paper, we devised the new technique proving formula size lower bounds and showed improved formula size lower bounds of some families of monotone self-dual Boolean functions such as majority functions, unbalanced and balanced recursive ternary majority functions. We hope that our method will be able to improve formula size lower bounds for any monotone self-dual Boolean function and even much broader classes of Boolean functions. Whether our technique (or its extensions) can break the 4n 2 barrier and improve the best formula size lower bound remains open. Acknowledgment The author is grateful to Norie Fu for cooperating computational experiments, Troy Lee for suggesting to look at compositions of Boolean functions, Patric Östergård for useful information about the exact cover problem, and Kazuhisa Makino for helpful discussion. This research is supported by Research Fellowship for Young Scientists from Japan Society for the Promotion of Science (JSPS) and Grant-in-Aid for JSPS Fellows.

12 696 K. UENO References [1] A. Ambainis. Quantum lower bounds by quantum arguments. Journal of Computer and System Sciences, 64(4): , [2] A. Ambainis, A. M. Childs, B. Reichardt, R. Špalek, and S. Zhang. Any AND-OR formula of size N can be evaluated in time N 1/2+o(1) on a quantum computer. In Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science, pages , [3] J. C. Bioch and T. Ibaraki. Decompositions of positive self-dual boolean functions. Discrete Mathematics, 140(1-3):23 46, [4] J. C. Bioch, T. Ibaraki, and K. Makino. Minimum self-dual decompositions of positive dual-minor boolean functions. Discrete Applied Mathematics, 96-97: , [5] E. Böhler, N. Creignou, S. Reith, and H. Vollmer. Playing with boolean blocks, part I: Post s lattice with applications to complexity theory. ACM SIGACT News, 34(4):38 52, [6] M. Grötschel, L. Lovász, and A. Schrijver. Geometric Algorithms and Combinatorial Optimization. Springer, [7] J. Håstad. The shrinkage exponent of De Morgan formulas is 2. SIAM Journal on Computing, 27(1):48 64, Feb [8] P. Høyer, T. Lee, and R. Špalek. Negative weights make adversaries stronger. In Proceedings of the 39th Annual ACM Symposium on Theory of Computing, pages , [9] T. Ibaraki and T. Kameda. A theory of coteries: Mutual exclusion in distributed systems. IEEE Transactions on Parallel and Distributed Computing, PDS-4(7): , July [10] T. S. Jayram, R. Kumar, and D. Sivakumar. Two applications of information complexity. In Proceedings of the 35th Annual ACM Symposium on Theory of Computing, pages , [11] M. Karchmer, E. Kushilevitz, and N. Nisan. Fractional covers and communication complexity. SIAM Journal on Discrete Mathematics, 8(1):76 92, Feb [12] M. Karchmer and A. Wigderson. Monotone circuits for connectivity require super-logarithmic depth. SIAM Journal on Discrete Mathematics, 3(2): , May [13] V. M. Khrapchenko. Complexity of the realization of a linear function in the case of π-circuits. Mathematical Notes, 9:21 23, [14] E. Koutsoupias. Improvements on Khrapchenko s theorem. Theoretical Computer Science, 116(2): , Aug [15] S. Laplante, T. Lee, and M. Szegedy. The quantum adversary method and classical formula size lower bounds. Computational Complexity, 15(2): , [16] T. Lee. A new rank technique for formula size lower bounds. In Proceedings of the 24th Annual Symposium on Theoretical Aspects of Computer Science, volume 4393 of Lecture Notes in Computer Science, pages Springer, [17] E. Mossel and R. O Donnell. On the noise sensitivity of monotone functions. Random Structures and Algorithms, 23(3): , [18] R. O Donnell. Hardness amplification within NP. Journal of Computer and System Sciences, 69(1):68 94, [19] M. Padberg. On the facial structure of the set packing polyhedra. Mathematical Programming, 5: , [20] M. S. Paterson, N. Pippenger, and U. Zwick. Optimal carry save networks. In Boolean function complexity, volume 169 of London Mathematical Society Lecture Note Series, pages Cambridge University Press, [21] E. L. Post. The two-valued iterative systems of mathematical logic, volume 5 of Annals Mathematical Studies. Princeton University Press, [22] J. Radhakrishnan. Better lower bounds for monotone threshold formulas. Journal of Computer and System Sciences, 54(2): , Apr [23] B. Reichardt and R. Spalek. Span-program-based quantum algorithm for evaluating formulas. In Proceedings of the 40th Annual ACM Symposium on Theory of Computing, pages , [24] M. E. Saks and A. Wigderson. Probabilistic boolean decision trees and the complexity of evaluating game trees. In Proceedings of the 27th Annual IEEE Symposium on Foundations of Computer Science, pages 29 38, [25] L. G. Valiant. Short monotone formulae for the majority function. Journal of Algorithms, 5(3): , Sept This work is licensed under the Creative Commons Attribution-NoDerivs License. To view a copy of this license, visit

Breaking the Rectangle Bound Barrier against Formula Size Lower Bounds

Breaking the Rectangle Bound Barrier against Formula Size Lower Bounds Breaking the Rectangle Bound Barrier against Formula Size Lower Bounds Kenya Ueno The Young Researcher Development Center and Graduate School of Informatics, Kyoto University kenya@kuis.kyoto-u.ac.jp Abstract.

More information

Nondeterminism LECTURE Nondeterminism as a proof system. University of California, Los Angeles CS 289A Communication Complexity

Nondeterminism LECTURE Nondeterminism as a proof system. University of California, Los Angeles CS 289A Communication Complexity University of California, Los Angeles CS 289A Communication Complexity Instructor: Alexander Sherstov Scribe: Matt Brown Date: January 25, 2012 LECTURE 5 Nondeterminism In this lecture, we introduce nondeterministic

More information

Partitions and Covers

Partitions and Covers University of California, Los Angeles CS 289A Communication Complexity Instructor: Alexander Sherstov Scribe: Dong Wang Date: January 2, 2012 LECTURE 4 Partitions and Covers In previous lectures, we saw

More information

Quantum algorithms based on span programs

Quantum algorithms based on span programs Quantum algorithms based on span programs Ben Reichardt IQC, U Waterloo [arxiv:0904.2759] Model: Complexity measure: Quantum algorithms Black-box query complexity Span programs Witness size [KW 93] [RŠ

More information

The quantum adversary method and classical formula size lower bounds

The quantum adversary method and classical formula size lower bounds The quantum adversary method and classical formula size lower bounds Sophie Laplante LRI, Université Paris-Sud laplante@lri.fr Troy Lee CWI and University of Amsterdam Troy.Lee@cwi.nl Mario Szegedy Rutgers

More information

CS Introduction to Complexity Theory. Lecture #11: Dec 8th, 2015

CS Introduction to Complexity Theory. Lecture #11: Dec 8th, 2015 CS 2401 - Introduction to Complexity Theory Lecture #11: Dec 8th, 2015 Lecturer: Toniann Pitassi Scribe Notes by: Xu Zhao 1 Communication Complexity Applications Communication Complexity (CC) has many

More information

The quantum adversary method and classical formula size lower bounds

The quantum adversary method and classical formula size lower bounds The quantum adversary method and classical formula size lower bounds Sophie Laplante LRI, Université Paris-Sud laplante@lri.fr Troy Lee CWI and University of Amsterdam Troy.Lee@cwi.nl Mario Szegedy Rutgers

More information

Communication is bounded by root of rank

Communication is bounded by root of rank Electronic Colloquium on Computational Complexity, Report No. 84 (2013) Communication is bounded by root of rank Shachar Lovett June 7, 2013 Abstract We prove that any total boolean function of rank r

More information

Product theorems via semidefinite programming

Product theorems via semidefinite programming Product theorems via semidefinite programming Troy Lee Department of Computer Science Rutgers University Rajat Mittal Department of Computer Science Rutgers University Abstract The tendency of semidefinite

More information

Semidefinite and Second Order Cone Programming Seminar Fall 2001 Lecture 5

Semidefinite and Second Order Cone Programming Seminar Fall 2001 Lecture 5 Semidefinite and Second Order Cone Programming Seminar Fall 2001 Lecture 5 Instructor: Farid Alizadeh Scribe: Anton Riabov 10/08/2001 1 Overview We continue studying the maximum eigenvalue SDP, and generalize

More information

Communication Complexity

Communication Complexity Communication Complexity Jie Ren Adaptive Signal Processing and Information Theory Group Nov 3 rd, 2014 Jie Ren (Drexel ASPITRG) CC Nov 3 rd, 2014 1 / 77 1 E. Kushilevitz and N. Nisan, Communication Complexity,

More information

On Convex Complexity Measures

On Convex Complexity Measures On Convex Complexity Measures P. Hrubeš a,1, S. Jukna b,c,2, A. Kulikov d,3, P. Pudlák e,,4 a School of Mathematics, Institute for Advanced Study, Princeton NJ b Institute of Mathematics and Computer Science,

More information

From Adversaries to Algorithms. Troy Lee Rutgers University

From Adversaries to Algorithms. Troy Lee Rutgers University From Adversaries to Algorithms Troy Lee Rutgers University Quantum Query Complexity As in classical complexity, it is difficult to show lower bounds on the time or number of gates required to solve a problem

More information

ON SENSITIVITY OF k-uniform HYPERGRAPH PROPERTIES

ON SENSITIVITY OF k-uniform HYPERGRAPH PROPERTIES ON SENSITIVITY OF k-uniform HYPERGRAPH PROPERTIES JOSHUA BIDERMAN, KEVIN CUDDY, ANG LI, MIN JAE SONG Abstract. In this paper we present a graph property with sensitivity Θ( n), where n = ( v 2) is the

More information

Lecture 16: Communication Complexity

Lecture 16: Communication Complexity CSE 531: Computational Complexity I Winter 2016 Lecture 16: Communication Complexity Mar 2, 2016 Lecturer: Paul Beame Scribe: Paul Beame 1 Communication Complexity In (two-party) communication complexity

More information

Improved Quantum Algorithm for Triangle Finding via Combinatorial Arguments

Improved Quantum Algorithm for Triangle Finding via Combinatorial Arguments Improved Quantum Algorithm for Triangle Finding via Combinatorial Arguments François Le Gall The University of Tokyo Technical version available at arxiv:1407.0085 [quant-ph]. Background. Triangle finding

More information

Approximation norms and duality for communication complexity lower bounds

Approximation norms and duality for communication complexity lower bounds Approximation norms and duality for communication complexity lower bounds Troy Lee Columbia University Adi Shraibman Weizmann Institute From min to max The cost of a best algorithm is naturally phrased

More information

arxiv: v1 [cs.cc] 22 Aug 2018

arxiv: v1 [cs.cc] 22 Aug 2018 New Bounds for Energy Complexity of Boolean Functions Krishnamoorthy Dinesh Samir Otiv Jayalal Sarma arxiv:1808.07199v1 [cs.cc] 22 Aug 2018 Abstract For a Boolean function f : {0, 1} n {0, 1} computed

More information

CS Foundations of Communication Complexity

CS Foundations of Communication Complexity CS 49 - Foundations of Communication Complexity Lecturer: Toniann Pitassi 1 The Discrepancy Method Cont d In the previous lecture we ve outlined the discrepancy method, which is a method for getting lower

More information

Fourier analysis of boolean functions in quantum computation

Fourier analysis of boolean functions in quantum computation Fourier analysis of boolean functions in quantum computation Ashley Montanaro Centre for Quantum Information and Foundations, Department of Applied Mathematics and Theoretical Physics, University of Cambridge

More information

On Resolution Like Proofs of Monotone Self-Dual Functions

On Resolution Like Proofs of Monotone Self-Dual Functions On Resolution Like Proofs of Monotone Self-Dual Functions Daya Ram Gaur Department of Mathematics and Computer Science University of Lethbridge, Lethbridge, AB, Canada, T1K 3M4 gaur@cs.uleth.ca Abstract

More information

The quantum query complexity of read-many formulas

The quantum query complexity of read-many formulas The quantum query complexity of read-many formulas Andrew Childs Waterloo Shelby Kimmel MIT Robin Kothari Waterloo Boolean formulas ^ x 1 x 2 _ x 3 ^ x 1 x 3 A formula is read-once if every input appears

More information

1 Primals and Duals: Zero Sum Games

1 Primals and Duals: Zero Sum Games CS 124 Section #11 Zero Sum Games; NP Completeness 4/15/17 1 Primals and Duals: Zero Sum Games We can represent various situations of conflict in life in terms of matrix games. For example, the game shown

More information

Lecture 5: February 21, 2017

Lecture 5: February 21, 2017 COMS 6998: Advanced Complexity Spring 2017 Lecture 5: February 21, 2017 Lecturer: Rocco Servedio Scribe: Diana Yin 1 Introduction 1.1 Last Time 1. Established the exact correspondence between communication

More information

Clique vs. Independent Set

Clique vs. Independent Set Lower Bounds for Clique vs. Independent Set Mika Göös University of Toronto Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4 On page 6... Mika Göös (Univ. of Toronto) Clique vs.

More information

Representations of Monotone Boolean Functions by Linear Programs

Representations of Monotone Boolean Functions by Linear Programs Electronic Colloquium on Computational Complexity, Report No. 106 (2017) Representations of Monotone Boolean Functions by Linear Programs Mateus de Oliveira Oliveira and Pavel Pudlák April 10, 2017 Abstract

More information

Lecture 13: Lower Bounds using the Adversary Method. 2 The Super-Basic Adversary Method [Amb02]

Lecture 13: Lower Bounds using the Adversary Method. 2 The Super-Basic Adversary Method [Amb02] Quantum Computation (CMU 18-859BB, Fall 015) Lecture 13: Lower Bounds using the Adversary Method October 1, 015 Lecturer: Ryan O Donnell Scribe: Kumail Jaffer 1 Introduction There are a number of known

More information

FOURIER CONCENTRATION FROM SHRINKAGE

FOURIER CONCENTRATION FROM SHRINKAGE FOURIER CONCENTRATION FROM SHRINKAGE Russell Impagliazzo and Valentine Kabanets March 29, 2016 Abstract. For a class F of formulas (general de Morgan or read-once de Morgan), the shrinkage exponent Γ F

More information

On the fractional chromatic number of monotone self-dual Boolean functions

On the fractional chromatic number of monotone self-dual Boolean functions Discrete Mathematics 309 (2009) 867 877 www.elsevier.com/locate/disc On the fractional chromatic number of monotone self-dual Boolean functions Daya Ram Gaur a,, Kazuhisa Makino b a University of Lethbridge,

More information

COS597D: Information Theory in Computer Science October 5, Lecture 6

COS597D: Information Theory in Computer Science October 5, Lecture 6 COS597D: Information Theory in Computer Science October 5, 2011 Lecture 6 Lecturer: Mark Braverman Scribe: Yonatan Naamad 1 A lower bound for perfect hash families. In the previous lecture, we saw that

More information

An Approximation Algorithm for Approximation Rank

An Approximation Algorithm for Approximation Rank An Approximation Algorithm for Approximation Rank Troy Lee Columbia University Adi Shraibman Weizmann Institute Conventions Identify a communication function f : X Y { 1, +1} with the associated X-by-Y

More information

1.1 P, NP, and NP-complete

1.1 P, NP, and NP-complete CSC5160: Combinatorial Optimization and Approximation Algorithms Topic: Introduction to NP-complete Problems Date: 11/01/2008 Lecturer: Lap Chi Lau Scribe: Jerry Jilin Le This lecture gives a general introduction

More information

On the tightness of the Buhrman-Cleve-Wigderson simulation

On the tightness of the Buhrman-Cleve-Wigderson simulation On the tightness of the Buhrman-Cleve-Wigderson simulation Shengyu Zhang Department of Computer Science and Engineering, The Chinese University of Hong Kong. syzhang@cse.cuhk.edu.hk Abstract. Buhrman,

More information

FRACTIONAL PACKING OF T-JOINS. 1. Introduction

FRACTIONAL PACKING OF T-JOINS. 1. Introduction FRACTIONAL PACKING OF T-JOINS FRANCISCO BARAHONA Abstract Given a graph with nonnegative capacities on its edges, it is well known that the capacity of a minimum T -cut is equal to the value of a maximum

More information

On covering graphs by complete bipartite subgraphs

On covering graphs by complete bipartite subgraphs On covering graphs by complete bipartite subgraphs S. Jukna a,1, A. S. Kulikov b,2 a Institute of Mathematics, Akademijos 4, LT-80663 Vilnius, Lithuania b Steklov Institute of Mathematics, Fontanka 27,

More information

arxiv: v1 [quant-ph] 6 Feb 2013

arxiv: v1 [quant-ph] 6 Feb 2013 Exact quantum query complexity of EXACT and THRESHOLD arxiv:302.235v [quant-ph] 6 Feb 203 Andris Ambainis Jānis Iraids Juris Smotrovs University of Latvia, Raiņa bulvāris 9, Riga, LV-586, Latvia February

More information

Cell-Probe Proofs and Nondeterministic Cell-Probe Complexity

Cell-Probe Proofs and Nondeterministic Cell-Probe Complexity Cell-obe oofs and Nondeterministic Cell-obe Complexity Yitong Yin Department of Computer Science, Yale University yitong.yin@yale.edu. Abstract. We study the nondeterministic cell-probe complexity of static

More information

Probabilistic Method. Benny Sudakov. Princeton University

Probabilistic Method. Benny Sudakov. Princeton University Probabilistic Method Benny Sudakov Princeton University Rough outline The basic Probabilistic method can be described as follows: In order to prove the existence of a combinatorial structure with certain

More information

arxiv: v1 [cs.cc] 16 Mar 2017

arxiv: v1 [cs.cc] 16 Mar 2017 A Nearly Optimal Lower Bound on the Approximate Degree of AC 0 Mark Bun mbun@cs.princeton.edu Justin Thaler justin.thaler@georgetown.edu arxiv:1703.05784v1 [cs.cc] 16 Mar 2017 Abstract The approximate

More information

A Lower Bound Technique for Nondeterministic Graph-Driven Read-Once-Branching Programs and its Applications

A Lower Bound Technique for Nondeterministic Graph-Driven Read-Once-Branching Programs and its Applications A Lower Bound Technique for Nondeterministic Graph-Driven Read-Once-Branching Programs and its Applications Beate Bollig and Philipp Woelfel FB Informatik, LS2, Univ. Dortmund, 44221 Dortmund, Germany

More information

Reflections Reflections

Reflections Reflections Reflections Reflections for quantum query algorithms Ben Reichardt University of Waterloo Reflections Reflections for quantum query algorithms Ben Reichardt University of Waterloo Reflections for quantum

More information

Parameterized Complexity of Weighted Satisfiability Problems

Parameterized Complexity of Weighted Satisfiability Problems Parameterized Complexity of Weighted Satisfiability Problems Nadia Creignou 1 and Heribert Vollmer 2 1 Laboratoire d Informatique Fondamentale de Marseille, CNRS UMR 7279, Aix-Marseille Université, 163

More information

Basing Decisions on Sentences in Decision Diagrams

Basing Decisions on Sentences in Decision Diagrams Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence Basing Decisions on Sentences in Decision Diagrams Yexiang Xue Department of Computer Science Cornell University yexiang@cs.cornell.edu

More information

Classes of Boolean Functions

Classes of Boolean Functions Classes of Boolean Functions Nader H. Bshouty Eyal Kushilevitz Abstract Here we give classes of Boolean functions that considered in COLT. Classes of Functions Here we introduce the basic classes of functions

More information

Non-Deterministic Time

Non-Deterministic Time Non-Deterministic Time Master Informatique 2016 1 Non-Deterministic Time Complexity Classes Reminder on DTM vs NDTM [Turing 1936] (q 0, x 0 ) (q 1, x 1 ) Deterministic (q n, x n ) Non-Deterministic (q

More information

ROUNDS IN COMMUNICATION COMPLEXITY REVISITED

ROUNDS IN COMMUNICATION COMPLEXITY REVISITED ROUNDS IN COMMUNICATION COMPLEXITY REVISITED NOAM NISAN AND AVI WIDGERSON Abstract. The k-round two-party communication complexity was studied in the deterministic model by [14] and [4] and in the probabilistic

More information

Matrix Rank in Communication Complexity

Matrix Rank in Communication Complexity University of California, Los Angeles CS 289A Communication Complexity Instructor: Alexander Sherstov Scribe: Mohan Yang Date: January 18, 2012 LECTURE 3 Matrix Rank in Communication Complexity This lecture

More information

Hardness of Approximation

Hardness of Approximation Hardness of Approximation We have seen several methods to find approximation algorithms for NP-hard problems We have also seen a couple of examples where we could show lower bounds on the achievable approxmation

More information

On Linear Secret Sharing for Connectivity in Directed Graphs

On Linear Secret Sharing for Connectivity in Directed Graphs On Linear Secret Sharing for Connectivity in Directed Graphs Amos Beimel 1 and Anat Paskin 2 1 Dept. of computer science, Ben-Gurion University, Beer Sheva, Israel. 2 Dept. of computer science, Technion,

More information

Quantum Algorithms for Evaluating Min-Max Trees

Quantum Algorithms for Evaluating Min-Max Trees Quantum Algorithms for Evaluating Min-Max Trees Richard Cleve 1,2,DmitryGavinsky 1, and D. L. Yonge-Mallo 1 1 David R. Cheriton School of Computer Science and Institute for Quantum Computing, University

More information

The complexity of acyclic subhypergraph problems

The complexity of acyclic subhypergraph problems The complexity of acyclic subhypergraph problems David Duris and Yann Strozecki Équipe de Logique Mathématique (FRE 3233) - Université Paris Diderot-Paris 7 {duris,strozecki}@logique.jussieu.fr Abstract.

More information

A Tight Lower Bound on Certificate Complexity in Terms of Block Sensitivity and Sensitivity

A Tight Lower Bound on Certificate Complexity in Terms of Block Sensitivity and Sensitivity Electronic Colloquium on Computational Complexity, Report No. 27 (2014) A Tight Lower Bound on Certificate Complexity in Terms of Block Sensitivity and Sensitivity Krišjānis Prūsis and Andris Ambainis

More information

Rounds in Communication Complexity Revisited

Rounds in Communication Complexity Revisited Rounds in Communication Complexity Revisited Noam Nisan Hebrew University Avi Widgerson Hebrew University and Princeton University Abstract The k-round two-party communication complexity was studied in

More information

- Well-characterized problems, min-max relations, approximate certificates. - LP problems in the standard form, primal and dual linear programs

- Well-characterized problems, min-max relations, approximate certificates. - LP problems in the standard form, primal and dual linear programs LP-Duality ( Approximation Algorithms by V. Vazirani, Chapter 12) - Well-characterized problems, min-max relations, approximate certificates - LP problems in the standard form, primal and dual linear programs

More information

A Lower Bound for the Size of Syntactically Multilinear Arithmetic Circuits

A Lower Bound for the Size of Syntactically Multilinear Arithmetic Circuits A Lower Bound for the Size of Syntactically Multilinear Arithmetic Circuits Ran Raz Amir Shpilka Amir Yehudayoff Abstract We construct an explicit polynomial f(x 1,..., x n ), with coefficients in {0,

More information

QUANTUM COMMUNICATIONS BASED ON QUANTUM HASHING. Alexander Vasiliev. Kazan Federal University

QUANTUM COMMUNICATIONS BASED ON QUANTUM HASHING. Alexander Vasiliev. Kazan Federal University QUANTUM COMMUNICATIONS BASED ON QUANTUM HASHING Alexander Vasiliev Kazan Federal University Abstract: In this paper we consider an application of the recently proposed quantum hashing technique for computing

More information

A Characterization of Graphs with Fractional Total Chromatic Number Equal to + 2

A Characterization of Graphs with Fractional Total Chromatic Number Equal to + 2 A Characterization of Graphs with Fractional Total Chromatic Number Equal to + Takehiro Ito a, William. S. Kennedy b, Bruce A. Reed c a Graduate School of Information Sciences, Tohoku University, Aoba-yama

More information

STUDY OF PERMUTATION MATRICES BASED LDPC CODE CONSTRUCTION

STUDY OF PERMUTATION MATRICES BASED LDPC CODE CONSTRUCTION EE229B PROJECT REPORT STUDY OF PERMUTATION MATRICES BASED LDPC CODE CONSTRUCTION Zhengya Zhang SID: 16827455 zyzhang@eecs.berkeley.edu 1 MOTIVATION Permutation matrices refer to the square matrices with

More information

Combinatorial Batch Codes and Transversal Matroids

Combinatorial Batch Codes and Transversal Matroids Combinatorial Batch Codes and Transversal Matroids Richard A. Brualdi, Kathleen P. Kiernan, Seth A. Meyer, Michael W. Schroeder Department of Mathematics University of Wisconsin Madison, WI 53706 {brualdi,kiernan,smeyer,schroede}@math.wisc.edu

More information

arxiv: v1 [cs.cc] 31 May 2014

arxiv: v1 [cs.cc] 31 May 2014 Size of Sets with Small Sensitivity: a Generalization of Simon s Lemma Andris Ambainis and Jevgēnijs Vihrovs arxiv:1406.0073v1 [cs.cc] 31 May 2014 Faculty of Computing, University of Latvia, Raiņa bulv.

More information

On Graph Complexity S. J U K N A

On Graph Complexity S. J U K N A On Graph Complexity S. J U K N A Universität Frankfurt, Institut für Informatik Robert-Mayer-Str. 11-15, D-60054 Frankfurt, Germany jukna@thi.informatik.uni-frankfurt.de and Institute of Mathematics and

More information

Increasing the Span of Stars

Increasing the Span of Stars Increasing the Span of Stars Ning Chen Roee Engelberg C. Thach Nguyen Prasad Raghavendra Atri Rudra Gynanit Singh Department of Computer Science and Engineering, University of Washington, Seattle, WA.

More information

Representations of All Solutions of Boolean Programming Problems

Representations of All Solutions of Boolean Programming Problems Representations of All Solutions of Boolean Programming Problems Utz-Uwe Haus and Carla Michini Institute for Operations Research Department of Mathematics ETH Zurich Rämistr. 101, 8092 Zürich, Switzerland

More information

CS Communication Complexity: Applications and New Directions

CS Communication Complexity: Applications and New Directions CS 2429 - Communication Complexity: Applications and New Directions Lecturer: Toniann Pitassi 1 Introduction In this course we will define the basic two-party model of communication, as introduced in the

More information

An Information Complexity Approach to the Inner Product Problem

An Information Complexity Approach to the Inner Product Problem An Information Complexity Approach to the Inner Product Problem William Henderson-Frost Advisor: Amit Chakrabarti Senior Honors Thesis Submitted to the faculty in partial fulfillment of the requirements

More information

CS6840: Advanced Complexity Theory Mar 29, Lecturer: Jayalal Sarma M.N. Scribe: Dinesh K.

CS6840: Advanced Complexity Theory Mar 29, Lecturer: Jayalal Sarma M.N. Scribe: Dinesh K. CS684: Advanced Complexity Theory Mar 29, 22 Lecture 46 : Size lower bounds for AC circuits computing Parity Lecturer: Jayalal Sarma M.N. Scribe: Dinesh K. Theme: Circuit Complexity Lecture Plan: Proof

More information

NP-completeness. Chapter 34. Sergey Bereg

NP-completeness. Chapter 34. Sergey Bereg NP-completeness Chapter 34 Sergey Bereg Oct 2017 Examples Some problems admit polynomial time algorithms, i.e. O(n k ) running time where n is the input size. We will study a class of NP-complete problems

More information

CS Foundations of Communication Complexity

CS Foundations of Communication Complexity CS 2429 - Foundations of Communication Complexity Lecturer: Sergey Gorbunov 1 Introduction In this lecture we will see how to use methods of (conditional) information complexity to prove lower bounds for

More information

CS 6820 Fall 2014 Lectures, October 3-20, 2014

CS 6820 Fall 2014 Lectures, October 3-20, 2014 Analysis of Algorithms Linear Programming Notes CS 6820 Fall 2014 Lectures, October 3-20, 2014 1 Linear programming The linear programming (LP) problem is the following optimization problem. We are given

More information

Linear-Time Algorithms for Finding Tucker Submatrices and Lekkerkerker-Boland Subgraphs

Linear-Time Algorithms for Finding Tucker Submatrices and Lekkerkerker-Boland Subgraphs Linear-Time Algorithms for Finding Tucker Submatrices and Lekkerkerker-Boland Subgraphs Nathan Lindzey, Ross M. McConnell Colorado State University, Fort Collins CO 80521, USA Abstract. Tucker characterized

More information

Lecture #21. c T x Ax b. maximize subject to

Lecture #21. c T x Ax b. maximize subject to COMPSCI 330: Design and Analysis of Algorithms 11/11/2014 Lecture #21 Lecturer: Debmalya Panigrahi Scribe: Samuel Haney 1 Overview In this lecture, we discuss linear programming. We first show that the

More information

Multi-Linear Formulas for Permanent and Determinant are of Super-Polynomial Size

Multi-Linear Formulas for Permanent and Determinant are of Super-Polynomial Size Multi-Linear Formulas for Permanent and Determinant are of Super-Polynomial Size Ran Raz Weizmann Institute ranraz@wisdom.weizmann.ac.il Abstract An arithmetic formula is multi-linear if the polynomial

More information

A New Approximation Algorithm for the Asymmetric TSP with Triangle Inequality By Markus Bläser

A New Approximation Algorithm for the Asymmetric TSP with Triangle Inequality By Markus Bläser A New Approximation Algorithm for the Asymmetric TSP with Triangle Inequality By Markus Bläser Presented By: Chris Standish chriss@cs.tamu.edu 23 November 2005 1 Outline Problem Definition Frieze s Generic

More information

BBM402-Lecture 20: LP Duality

BBM402-Lecture 20: LP Duality BBM402-Lecture 20: LP Duality Lecturer: Lale Özkahya Resources for the presentation: https://courses.engr.illinois.edu/cs473/fa2016/lectures.html An easy LP? which is compact form for max cx subject to

More information

The cocycle lattice of binary matroids

The cocycle lattice of binary matroids Published in: Europ. J. Comb. 14 (1993), 241 250. The cocycle lattice of binary matroids László Lovász Eötvös University, Budapest, Hungary, H-1088 Princeton University, Princeton, NJ 08544 Ákos Seress*

More information

1 The independent set problem

1 The independent set problem ORF 523 Lecture 11 Spring 2016, Princeton University Instructor: A.A. Ahmadi Scribe: G. Hall Tuesday, March 29, 2016 When in doubt on the accuracy of these notes, please cross chec with the instructor

More information

1 Integer Decomposition Property

1 Integer Decomposition Property CS 598CSC: Combinatorial Optimization Lecture date: Feb 2, 2010 Instructor: Chandra Chekuri Scribe: Siva Theja Maguluri Material taken mostly from [1] (Chapter 19). 1 Integer Decomposition Property A polyhedron

More information

Self-duality of bounded monotone boolean functions and related problems

Self-duality of bounded monotone boolean functions and related problems Discrete Applied Mathematics 156 (2008) 1598 1605 www.elsevier.com/locate/dam Self-duality of bounded monotone boolean functions and related problems Daya Ram Gaur a, Ramesh Krishnamurti b a Department

More information

Finding a Heaviest Triangle is not Harder than Matrix Multiplication

Finding a Heaviest Triangle is not Harder than Matrix Multiplication Finding a Heaviest Triangle is not Harder than Matrix Multiplication Artur Czumaj Department of Computer Science New Jersey Institute of Technology aczumaj@acm.org Andrzej Lingas Department of Computer

More information

Near-Optimal Algorithms for Maximum Constraint Satisfaction Problems

Near-Optimal Algorithms for Maximum Constraint Satisfaction Problems Near-Optimal Algorithms for Maximum Constraint Satisfaction Problems Moses Charikar Konstantin Makarychev Yury Makarychev Princeton University Abstract In this paper we present approximation algorithms

More information

LOWER BOUNDS ON BALANCING SETS AND DEPTH-2 THRESHOLD CIRCUITS

LOWER BOUNDS ON BALANCING SETS AND DEPTH-2 THRESHOLD CIRCUITS LOWER BOUNDS ON BALANCING SETS AND DEPTH-2 THRESHOLD CIRCUITS PAVEL HRUBEŠ, SIVARAMAKRISHNAN NATARAJAN RAMAMOORTHY, ANUP RAO, AND AMIR YEHUDAYOFF Abstract. There are various notions of balancing set families

More information

Realization Plans for Extensive Form Games without Perfect Recall

Realization Plans for Extensive Form Games without Perfect Recall Realization Plans for Extensive Form Games without Perfect Recall Richard E. Stearns Department of Computer Science University at Albany - SUNY Albany, NY 12222 April 13, 2015 Abstract Given a game in

More information

CS675: Convex and Combinatorial Optimization Fall 2014 Combinatorial Problems as Linear Programs. Instructor: Shaddin Dughmi

CS675: Convex and Combinatorial Optimization Fall 2014 Combinatorial Problems as Linear Programs. Instructor: Shaddin Dughmi CS675: Convex and Combinatorial Optimization Fall 2014 Combinatorial Problems as Linear Programs Instructor: Shaddin Dughmi Outline 1 Introduction 2 Shortest Path 3 Algorithms for Single-Source Shortest

More information

Generating p-extremal graphs

Generating p-extremal graphs Generating p-extremal graphs Derrick Stolee Department of Mathematics Department of Computer Science University of Nebraska Lincoln s-dstolee1@math.unl.edu August 2, 2011 Abstract Let f(n, p be the maximum

More information

A note on monotone real circuits

A note on monotone real circuits A note on monotone real circuits Pavel Hrubeš and Pavel Pudlák March 14, 2017 Abstract We show that if a Boolean function f : {0, 1} n {0, 1} can be computed by a monotone real circuit of size s using

More information

Lower Bounds for Cutting Planes Proofs. with Small Coecients. Abstract. We consider small-weight Cutting Planes (CP ) proofs; that is,

Lower Bounds for Cutting Planes Proofs. with Small Coecients. Abstract. We consider small-weight Cutting Planes (CP ) proofs; that is, Lower Bounds for Cutting Planes Proofs with Small Coecients Maria Bonet y Toniann Pitassi z Ran Raz x Abstract We consider small-weight Cutting Planes (CP ) proofs; that is, Cutting Planes (CP ) proofs

More information

Lecture 10 February 4, 2013

Lecture 10 February 4, 2013 UBC CPSC 536N: Sparse Approximations Winter 2013 Prof Nick Harvey Lecture 10 February 4, 2013 Scribe: Alexandre Fréchette This lecture is about spanning trees and their polyhedral representation Throughout

More information

Graph coloring, perfect graphs

Graph coloring, perfect graphs Lecture 5 (05.04.2013) Graph coloring, perfect graphs Scribe: Tomasz Kociumaka Lecturer: Marcin Pilipczuk 1 Introduction to graph coloring Definition 1. Let G be a simple undirected graph and k a positive

More information

Restricted b-matchings in degree-bounded graphs

Restricted b-matchings in degree-bounded graphs Egerváry Research Group on Combinatorial Optimization Technical reports TR-009-1. Published by the Egerváry Research Group, Pázmány P. sétány 1/C, H1117, Budapest, Hungary. Web site: www.cs.elte.hu/egres.

More information

Grothendieck Inequalities, XOR games, and Communication Complexity

Grothendieck Inequalities, XOR games, and Communication Complexity Grothendieck Inequalities, XOR games, and Communication Complexity Troy Lee Rutgers University Joint work with: Jop Briët, Harry Buhrman, and Thomas Vidick Overview Introduce XOR games, Grothendieck s

More information

1 Computational Complexity of Graphs

1 Computational Complexity of Graphs 1 1 Computational Complexity of Graphs Stasys Jukna 1 Computational complexity of graphs is the smallest number of union and intersection operations required to generate them when starting from simplest

More information

Toward Better Formula Lower Bounds: the Composition of a Function and a Universal Relation

Toward Better Formula Lower Bounds: the Composition of a Function and a Universal Relation Toward Better Formula Lower Bounds: the Composition of a Function and a Universal Relation Dmitry Gavinsky Or Meir Omri Weinstein Avi Wigderson August 20, 2016 Abstract One of the major open problems in

More information

18.5 Crossings and incidences

18.5 Crossings and incidences 18.5 Crossings and incidences 257 The celebrated theorem due to P. Turán (1941) states: if a graph G has n vertices and has no k-clique then it has at most (1 1/(k 1)) n 2 /2 edges (see Theorem 4.8). Its

More information

Classical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems

Classical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems Classical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems Rani M. R, Mohith Jagalmohanan, R. Subashini Binary matrices having simultaneous consecutive

More information

Properties and Classification of the Wheels of the OLS Polytope.

Properties and Classification of the Wheels of the OLS Polytope. Properties and Classification of the Wheels of the OLS Polytope. G. Appa 1, D. Magos 2, I. Mourtos 1 1 Operational Research Department, London School of Economics. email: {g.appa, j.mourtos}@lse.ac.uk

More information

arxiv: v2 [cs.ds] 17 Sep 2017

arxiv: v2 [cs.ds] 17 Sep 2017 Two-Dimensional Indirect Binary Search for the Positive One-In-Three Satisfiability Problem arxiv:1708.08377v [cs.ds] 17 Sep 017 Shunichi Matsubara Aoyama Gakuin University, 5-10-1, Fuchinobe, Chuo-ku,

More information

Computer Organization I

Computer Organization I Computer Organization I Lecture 6: Boolean Algebra /2/29 Wei Lu CS283 Overview Two Principles in Boolean Algebra () Duality Principle (2) Complement Principle Standard Form of Logic Expression () Sum of

More information

A semi-definite program for quantum query complexity

A semi-definite program for quantum query complexity A semi-definite program for quantum query complexity Ben Reichardt University of Waterloo [These slides and notes are for a 30-minute talk given at the second Barriers in Computational Complexity Workshop,

More information

Disjoint DNF Tautologies with Conflict Bound Two

Disjoint DNF Tautologies with Conflict Bound Two Journal on Satisfiability, Boolean Modeling and Computation 4 (2007) 1-14 Disjoint DNF Tautologies with Conflict Bound Two Balás Sörényi Hungarian Academy of Sciences and University of Seged Research Group

More information